/llvm-project/compiler-rt/test/fuzzer/ |
H A D | only-some-bytes-fork.test | 10 …: %no_fuzzer_cpp_compiler -c -fno-sanitize=all -fsanitize=dataflow %S/../../lib/fuzzer/dataflow/Da… 11 …_compiler -c -fno-sanitize=all -fPIC %S/../../lib/fuzzer/dataflow/DataFlowCallbacks… 12 DISABLED: %no_fuzzer_cpp_compiler -fno-sanitize=all -fsanitize=dataflow -fsanitize-coverage=trac…
|
H A D | dataflow.test | 4 # Disable, like other dataflow tests. 9 RUN: %no_fuzzer_cpp_compiler -c -fno-sanitize=all -fsanitize=dataflow %S/../../lib/fuzzer/dataflow/… 10 RUN: %no_fuzzer_cpp_compiler -c -fno-sanitize=all -fPIC %S/../../lib/fuzzer/dataflow… 11 RUN: %no_fuzzer_cpp_compiler -fno-sanitize=all -fsanitize=dataflow -fsanitize-coverage=trace-pc-… 12 RUN: %no_fuzzer_cpp_compiler -fno-sanitize=all -fsanitize=dataflow -fsanitize-coverage=trace-pc-…
|
H A D | only-some-bytes.test | 10 …: %no_fuzzer_cpp_compiler -c -fno-sanitize=all -fsanitize=dataflow %S/../../lib/fuzzer/dataflow/Da… 11 …_compiler -c -fno-sanitize=all -fPIC %S/../../lib/fuzzer/dataflow/DataFlowCallbacks… 12 DISABLED: %no_fuzzer_cpp_compiler -fno-sanitize=all -fsanitize=dataflow -fsanitize-coverage=trac…
|
/llvm-project/clang/include/clang/Analysis/FlowSensitive/ |
H A D | DataflowValues.h | 30 namespace dataflow { 40 typename _AnalysisDirTag = dataflow::forward_analysis_tag > 69 bool isForwardAnalysis(dataflow::forward_analysis_tag) { return true; } in isForwardAnalysis() 70 bool isForwardAnalysis(dataflow::backward_analysis_tag) { return false; } in isForwardAnalysis()
|
H A D | Formula.h | 21 namespace clang::dataflow { 135 template <> struct DenseMapInfo<clang::dataflow::Atom> { 136 using Atom = clang::dataflow::Atom;
|
H A D | MapLattice.h | 29 namespace dataflow { 117 const clang::dataflow::MapLattice<Key, ElementLattice> &M) { 130 const clang::dataflow::VarMapLattice<ElementLattice> &M) { 140 } // namespace dataflow
|
H A D | DataflowLattice.h | 18 namespace dataflow {
|
H A D | DebugSupport.h | 25 namespace dataflow {
|
H A D | NoopLattice.h | 22 namespace dataflow { 24 /// Trivial lattice for dataflow analysis with exactly one element. 40 } // namespace dataflow 49 Any::TypeId<clang::dataflow::NoopLattice>;
|
H A D | SimplifyConstraints.h | 17 namespace dataflow {
|
H A D | RecordOps.h | 20 namespace dataflow {
|
H A D | WatchedLiteralsSolver.h | 22 namespace dataflow {
|
H A D | NoopAnalysis.h | 23 namespace dataflow {
|
/llvm-project/clang-tools-extra/clang-tidy/bugprone/ |
H A D | UncheckedOptionalAccessCheck.cpp | 21 using dataflow::UncheckedOptionalAccessDiagnoser; 22 using dataflow::UncheckedOptionalAccessModel; 56 dataflow::diagnoseFunction<UncheckedOptionalAccessModel, in check()
|
/llvm-project/clang/unittests/Analysis/FlowSensitive/ |
H A D | TestingSupportTest.cpp | 13 using namespace dataflow; 21 using ::clang::dataflow::test::AnalysisInputs; 22 using ::clang::dataflow::test::AnalysisOutputs; 23 using ::clang::dataflow::test::checkDataflow;
|
H A D | SingleVarConstantPropagationTest.cpp | 42 namespace dataflow { namespace 177 using ::clang::dataflow::test::AnalysisInputs; 178 using ::clang::dataflow::test::AnalysisOutputs; 179 using ::clang::dataflow::test::checkDataflow;
|
H A D | MultiVarConstantPropagationTest.cpp | 42 namespace dataflow { namespace 191 using ::clang::dataflow::test::AnalysisInputs; 192 using ::clang::dataflow::test::AnalysisOutputs; 193 using ::clang::dataflow::test::checkDataflow;
|
H A D | WatchedLiteralsSolverTest.cpp | 12 namespace clang::dataflow::test { namespace
|
H A D | TestingSupport.h | 52 namespace dataflow {
|
/llvm-project/clang/include/clang/Analysis/FlowSensitive/Models/ |
H A D | UncheckedOptionalAccessModel.h | 9 // This file defines a dataflow analysis that detects unsafe uses of optional 28 namespace dataflow { 59 UncheckedOptionalAccessModel(ASTContext &Ctx, dataflow::Environment &Env); 91 } // namespace dataflow
|
H A D | ChromiumCheckModel.h | 21 namespace dataflow {
|
/llvm-project/flang/lib/Optimizer/Transforms/ |
H A D | StackArrays.cpp | 117 class LatticePoint : public mlir::dataflow::AbstractDenseLattice { 149 : public mlir::dataflow::DenseForwardDataFlowAnalysis<LatticePoint> { 419 !getOrCreateFor<mlir::dataflow::Executable>( in analyseFunction() 425 mlir::dataflow::AbstractDenseLattice *after = getLattice(point); in analyseFunction() 437 const mlir::dataflow::AbstractDenseLattice *before = in analyseFunction() 461 solver.load<mlir::dataflow::SparseConstantPropagation>(); in analyseFunction() 462 solver.load<mlir::dataflow::DeadCodeAnalysis>(); in analyseFunction()
|
/llvm-project/mlir/test/lib/Analysis/DataFlow/ |
H A D | TestDenseBackwardDataFlowAnalysis.cpp | 9 // Test pass for backward dense dataflow analysis. 30 using namespace mlir::dataflow; 31 using namespace mlir::dataflow::test; 39 using dataflow::AbstractDenseLattice::AbstractDenseLattice; 279 emitError(op->getLoc(), "dataflow solver failed"); in runOnOperation()
|
/llvm-project/mlir/docs/Tutorials/ |
H A D | DataFlowAnalysis.md | 3 Writing dataflow analyses in MLIR, or well any compiler, can often seem quite 4 daunting and/or complex. A dataflow analysis generally involves propagating 14 One type of dataflow analysis is a forward propagation analysis. This type of 17 writing a simple forward dataflow analysis in MLIR. Let's say for this analysis 67 held by an element of the lattice used by our dataflow analysis: 184 The `ForwardDataFlowAnalysis` class represents the driver of the dataflow 191 /// This class represents the main driver of the forward dataflow analysis. It
|
/llvm-project/mlir/include/mlir/Interfaces/ |
H A D | InferIntRangeInterface.td | 30 since the dataflow analysis handles those case), the method should call 58 (that isn't a branch argument, since the dataflow analysis handles
|